(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Publishing Venue

Related People

Abstract

Where a Personal Computer (PC) may be used by more than one user, it may be desirable to provide password protection against unauthorized use. Unauthorized use of the PC, or merely unauthorized access to the associated large-capacity rigid disk, is precluded by the Hardware Security System (HSS) described herein, which also provides for changing required passwords. During the power-up sequence of the PC, the present system executes code residing in Eraseable Programmable Read-Only Memory (EPROM) in response to entry of a password by the user, which also determines the level of access given to the user. Upon execution of the code, access to the entire system, or to the system without the rigid disk, is either allowed or denied. In either event, however, the EPROM is disconnected to preclude scanning for passwords.

Country

United States

Language

English (United States)

This text was extracted from a PDF file.

At least one non-text object (such as an image or picture) has been suppressed.

This is the abbreviated version, containing approximately
64% of the total text.

Page 1 of 2

Multi-User Security SYSTEM for a Personal Computer

Where a Personal Computer (PC) may be used by more than one user, it may
be desirable to provide password protection against unauthorized use.
Unauthorized use of the PC, or merely unauthorized access to the associated
large-capacity rigid disk, is precluded by the Hardware Security System (HSS)
described herein, which also provides for changing required passwords. During
the power-up sequence of the PC, the present system executes code residing in
Eraseable Programmable Read-Only Memory (EPROM) in response to entry of a
password by the user, which also determines the level of access given to the
user. Upon execution of the code, access to the entire system, or to the system
without the rigid disk, is either allowed or denied. In either event, however, the
EPROM is disconnected to preclude scanning for passwords. The EPROM is re-
connected only when the power-up sequence is initiated again. Of course, it is
presumed that the EPROM is physically secure in the chassis of the PC.
Referring now to the figure, EPROM 12 is accessed during the PC power-up
sequence in response to the RESET DRV signal applied to LATCH 13 from
POWER ON RESET 14. EPROM 12 is disconnected by the GATE OFF signal
applied to LATCH 13 from I/O ADDR DECODE 15. LATCH 16 permits entry of
new passwords into EPROM 12 unless disabled by the PROM WRITE DISABLE
signal from I/O ADDR DECODE 15. With continuing reference to the figure, the
DRIVE SELECT sig...